Eng. Omar Abdullah Al Nomany, Vice President of IT, STC Saudi Arabian STC this week inaugurated what it calls the largest information security control centre in the region to improve the security features of the telco’s systems and ...
Tags: STC, Security Operations Centre, IT
Some school administrators are testing a bold idea to integrate the multitude of systems that are used to store student data, giving teachers a single view of how students are performing and allowing them to better deliver the right ...
Tags: data storage, school app, internet
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
Several Certificate Authorities (CAs) have formed an advocacy group called the Certificate Authority Security Council (CASC), which will focus on promoting new security standards, policies and best practices for SSL (Secure Sockets Layer) ...
Tags: CAs, web security, SSL deployment
Forget fumbling with cash and credit cards; smartphones have long been seen as a way to make in store purchases faster and easier. But several challenges need to be overcome before the technology takes off. The field of mobile payments ...
Tags: smartphones, mobile payments, mobile techs
The growth in cloud computing is a double-edged sword, Europe’s top cyber security agency warned on Thursday. The European Network and Information Security Agency (ENISA) published a new report on the cloud from the perspective of ...
Tags: cloud computing, cyber security agency, EU
Any bank, hospital or energy provider that suffers a cyber-attack would have to inform regulators under new EU proposals announced today. Launched in Brussels by European Commission Vice-President for the Digital Agenda Neelie Kroes, ...
Tags: cyber-attack, EU proposals, Cybercrime
Adobe has released an emergency patch to fix at least two zero-day vulnerabilities being used to install malware in its Flash Player software that could allow attackers to control affected systems. Hackers had exploited security loopholes ...
The passwords of about 250,000 Twitter users were stolen in a "sophisticated" cyber attack similar to those that recently hit major Western news outlets. "This attack was not the work of amateurs, and we do not believe it was an isolated ...
Tags: cyber attack, media companies, network
ownCloud Inc., the company behind the world's most popular secure open source file sync and share software, announced today the forming of a board of directors, and named several leading industry executives to the board. Led by ...
Tags: ownCloud, secure open source file sync, share software
The scary stories from the Web are getting worse.First there were a few stolen credit card numbers.Then there were a few thousand.Now we hear about millions of financial records being exposed by security breaches,and we grow numb to the ...
Tags: Code Safeguard, Developers, Internet
A Philips information management system, which is used in making administrative chores in hospital more efficient, contains vulnerabilities that can be exploited to gain full control of the product, a security vendor said on Thursday. ...
Data eraser for the enterprise gets a makeover Kroll Ontrack, a provider of data recovery, information management and e-disclosure, announced the launch of Ontrack Eraser 4.0, an enterprise data eraser offering. The firm said it has ...
Tags: Kroll Ontrack, data recovery, information management, data eraser
A study found that at the end of 2012, 51% of secure IT networks were breached from employees using personal devices. While over half of large organisations experienced breaches in security, only 25% of small business experienced the ...
Tags: enterprise networks, personal devices, networks, browser